Download presentation
Presentation is loading. Please wait.
Published byDominick McGee Modified over 8 years ago
1
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation
2
2 Objective: Discover current trends in securing large (global) enterprise IT networks Target Industries: Companies with US headquarters, global scale, and 10,000+ employees Target Audience: Executives responsible for Network Security, Network Administration, and related IT functions Total Surveys: 100 executive interviews Research Overview
3
3 Source: LTM Research; n = 93 An overwhelming majority of IT networking and security executives are confident they can do real-time assessments of their networks from the outside
4
4 Source: LTM Research; n = 100 And a vast majority are confident that their security and threat procedures are doing the job protecting their information assets
5
5 IPAM is the most commonly-used method to gather “authoritative” information on systems and devices on the network Source: LTM Research; n = 82 Other: Firewall Outside vendor Homegrown Tools IDS/IPS All manual Other tools as well Server Workstation and In-house Monitoring They use number of commercial and in-house products
6
6 Almost 90% think they have the ability to compare normal patterns of network cyber activity against new anomalies as they occur Source: LTM Research; n = 91 Of companies which cannot currently compare baseline against new anomalies, half do not plan to invest in this capability
7
7 And almost 90% also say they monitor communication patterns and routing tables to identify anomalous device interactions Source: LTM Research; n = 90
8
8 Source: LTM Research; n = 89-91 But almost half say there are key impediments to attaining network visibility, so they don’t know what they’re missing...
9
9 Source: LTM Research; n = 90 Despite the view from the majority that they are notified about rogue assets or behavior quickly, industry breach data tells a different story
10
10 Source: LTM Research; n = 100 Little wonder that 2/3 are concerned they are experiencing an undetected attack right now
11
11 Source: LTM Research; n = 100 And they are particularly concerned about threats from transitory assets like mobile, virtual and cloud
12
12 Source: LTM Research; n = 95 Because most say they can’t detect threats fast enough from those transitory assets
13
13 Source: LTM Research; n = 92 90% say they need to detect breaches of their network within a day, while industry data shows the average duration of a breach is more than six (6) months
14
14 Nearly one-third of companies do not determine the severity of a network vulnerability Source: LTM Research; n = 72
15
15 The severity of a network vulnerability is most commonly determined by test attempts to exploit the vulnerability Source: LTM Research; n = 72 Other: 21 use monitoring 24/7 with various tools A combination of things but not allowed to disclose Also network monitoring Handled by Third party company Test & Monitor Third-party tools Use various tools that helps them prioritize
16
16 70% are pleased with SIEM for real-time analysis of security alerts generated by network hardware and applications… Source: LTM Research; n = 56
17
17 Despite the high SIEM satisfaction rate, it's puzzling that 42% are manually evaluating threat data and 45% have chosen another platform for automation Source: LTM Research; n = 81 And 42% still ignore or manually evaluate threat data Very concerning!
18
18 Source: LTM Research; n = 91 Clearly something needs to be done to improve context to minimize data overload of stretched network and security staff
19
19 Next Steps Do you have any of these concerns in your organization? Are you interested in a case study where Lumeta has helped an organization similar to yours solve these same concerns?
20
20 Thank You!
21
21
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.